Auto login the user after password is set (#14344)

* login after creating super admin user

* Allow keyboard enter key in create account from invite

* Allow enter key to submit password reset

* Min length for password validation should be 12

* Default PASSWORD_MIN_LENGTH to 12

* fix unit tests

* Fix unit tests

* Add passwordMinLength to admin store
This commit is contained in:
melohagan 2024-08-08 17:45:04 +01:00 committed by GitHub
parent f3f6f8d9b0
commit c86b1d7ca5
No known key found for this signature in database
GPG Key ID: B5690EEEBB952194
16 changed files with 62 additions and 22 deletions

View File

@ -1,6 +1,6 @@
import env from "../environment" import env from "../environment"
export const PASSWORD_MIN_LENGTH = +(env.PASSWORD_MIN_LENGTH || 8) export const PASSWORD_MIN_LENGTH = +(env.PASSWORD_MIN_LENGTH || 12)
export const PASSWORD_MAX_LENGTH = +(env.PASSWORD_MAX_LENGTH || 512) export const PASSWORD_MAX_LENGTH = +(env.PASSWORD_MAX_LENGTH || 512)
export function validatePassword( export function validatePassword(

View File

@ -4,7 +4,7 @@ import { PASSWORD_MAX_LENGTH, validatePassword } from "../auth"
describe("auth", () => { describe("auth", () => {
describe("validatePassword", () => { describe("validatePassword", () => {
it("a valid password returns successful", () => { it("a valid password returns successful", () => {
expect(validatePassword("password")).toEqual({ valid: true }) expect(validatePassword("password123!")).toEqual({ valid: true })
}) })
it.each([ it.each([
@ -14,7 +14,7 @@ describe("auth", () => {
])("%s returns unsuccessful", (_, password) => { ])("%s returns unsuccessful", (_, password) => {
expect(validatePassword(password as string)).toEqual({ expect(validatePassword(password as string)).toEqual({
valid: false, valid: false,
error: "Password invalid. Minimum 8 characters.", error: "Password invalid. Minimum 12 characters.",
}) })
}) })

View File

@ -21,7 +21,7 @@ export const user = (userProps?: Partial<Omit<User, "userId">>): User => {
_id: userId, _id: userId,
userId, userId,
email: newEmail(), email: newEmail(),
password: "password", password: "password123!",
roles: { app_test: "admin" }, roles: { app_test: "admin" },
firstName: generator.first(), firstName: generator.first(),
lastName: generator.last(), lastName: generator.last(),

View File

@ -1,14 +1,17 @@
<script> <script>
import { FancyForm, FancyInput } from "@budibase/bbui" import { FancyForm, FancyInput } from "@budibase/bbui"
import { createValidationStore, requiredValidator } from "helpers/validation" import { createValidationStore, requiredValidator } from "helpers/validation"
import { admin } from "stores/portal"
export let password export let password
export let passwordForm export let passwordForm
export let error export let error
$: passwordMinLength = $admin.passwordMinLength ?? 12
const validatePassword = value => { const validatePassword = value => {
if (!value || value.length < 12) { if (!value || value.length < passwordMinLength) {
return "Please enter at least 12 characters. We recommend using machine generated or random passwords." return `Please enter at least ${passwordMinLength} characters. We recommend using machine generated or random passwords.`
} }
return null return null
} }
@ -31,7 +34,8 @@
!$firstPassword || !$firstPassword ||
!$firstTouched || !$firstTouched ||
!$repeatTouched || !$repeatTouched ||
$firstPassword !== $repeatPassword $firstPassword !== $repeatPassword ||
firstPasswordError
</script> </script>
<FancyForm bind:this={passwordForm}> <FancyForm bind:this={passwordForm}>

View File

@ -14,8 +14,15 @@
notifications.error("Failed to update password") notifications.error("Failed to update password")
} }
} }
const handleKeydown = evt => {
if (evt.key === "Enter" && !error && password) {
updatePassword()
}
}
</script> </script>
<svelte:window on:keydown={handleKeydown} />
<ModalContent <ModalContent
title="Update password" title="Update password"
confirmText="Update password" confirmText="Update password"

View File

@ -18,7 +18,7 @@
let password = null let password = null
const validation = createValidationStore() const validation = createValidationStore()
validation.addValidatorType("password", "password", true, { minLength: 8 }) validation.addValidatorType("password", "password", true, { minLength: 12 })
$: validation.observe("password", password) $: validation.observe("password", password)
const Step = { CONFIG: "config", SET_PASSWORD: "set_password" } const Step = { CONFIG: "config", SET_PASSWORD: "set_password" }

View File

@ -21,6 +21,7 @@
let submitted = false let submitted = false
$: tenantId = $auth.tenantId $: tenantId = $auth.tenantId
$: passwordMinLength = $admin.passwordMinLength ?? 12
async function save() { async function save() {
form.validate() form.validate()
@ -35,14 +36,25 @@
await API.createAdminUser(adminUser) await API.createAdminUser(adminUser)
notifications.success("Admin user created") notifications.success("Admin user created")
await admin.init() await admin.init()
await auth.login({
username: formData?.email.trim(),
password: formData?.password,
})
$goto("../portal") $goto("../portal")
} catch (error) { } catch (error) {
submitted = false submitted = false
notifications.error(error.message || "Failed to create admin user") notifications.error(error.message || "Failed to create admin user")
} }
} }
const handleKeydown = evt => {
if (evt.key === "Enter") {
save()
}
}
</script> </script>
<svelte:window on:keydown={handleKeydown} />
<TestimonialPage> <TestimonialPage>
<Layout gap="M" noPadding> <Layout gap="M" noPadding>
<Layout justifyItems="center" noPadding> <Layout justifyItems="center" noPadding>
@ -83,9 +95,15 @@
validate={() => { validate={() => {
let fieldError = {} let fieldError = {}
fieldError["password"] = !formData.password if (!formData.password) {
? "Please enter a password" fieldError["password"] = "Please enter a password"
: undefined } else if (formData.password.length < passwordMinLength) {
fieldError[
"password"
] = `Password must be at least ${passwordMinLength} characters`
} else {
fieldError["password"] = undefined
}
fieldError["confirmationPassword"] = fieldError["confirmationPassword"] =
!passwordsMatch( !passwordsMatch(

View File

@ -9,7 +9,7 @@
FancyInput, FancyInput,
} from "@budibase/bbui" } from "@budibase/bbui"
import { goto, params } from "@roxi/routify" import { goto, params } from "@roxi/routify"
import { users, organisation, auth } from "stores/portal" import { users, organisation, auth, admin } from "stores/portal"
import Logo from "assets/bb-emblem.svg" import Logo from "assets/bb-emblem.svg"
import { TestimonialPage } from "@budibase/frontend-core/src/components" import { TestimonialPage } from "@budibase/frontend-core/src/components"
import { onMount } from "svelte" import { onMount } from "svelte"
@ -23,6 +23,7 @@
let loaded = false let loaded = false
$: company = $organisation.company || "Budibase" $: company = $organisation.company || "Budibase"
$: passwordMinLength = $admin.passwordMinLength ?? 12
async function acceptInvite() { async function acceptInvite() {
form.validate() form.validate()
@ -85,8 +86,15 @@
notifications.error("Error getting invite config") notifications.error("Error getting invite config")
} }
}) })
const handleKeydown = evt => {
if (evt.key === "Enter") {
acceptInvite()
}
}
</script> </script>
<svelte:window on:keydown={handleKeydown} />
{#if loaded} {#if loaded}
<TestimonialPage> <TestimonialPage>
<Layout gap="M" noPadding> <Layout gap="M" noPadding>
@ -154,8 +162,8 @@
function validatePassword() { function validatePassword() {
if (!formData.password) { if (!formData.password) {
return "Please enter a password" return "Please enter a password"
} else if (formData.password.length < 8) { } else if (formData.password.length < passwordMinLength) {
return "Please enter at least 8 characters" return `Please enter at least ${passwordMinLength} characters`
} }
return undefined return undefined
} }

View File

@ -50,6 +50,7 @@ export function createAdminStore() {
store.baseUrl = environment.baseUrl store.baseUrl = environment.baseUrl
store.offlineMode = environment.offlineMode store.offlineMode = environment.offlineMode
store.maintenance = environment.maintenance store.maintenance = environment.maintenance
store.passwordMinLength = environment.passwordMinLength
return store return store
}) })
} }

View File

@ -42,6 +42,7 @@ export const fetch = async (ctx: Ctx) => {
baseUrl: env.PLATFORM_URL, baseUrl: env.PLATFORM_URL,
isDev: env.isDev() && !env.isTest(), isDev: env.isDev() && !env.isTest(),
maintenance: [], maintenance: [],
passwordMinLength: env.PASSWORD_MIN_LENGTH,
} }
if (env.SELF_HOSTED) { if (env.SELF_HOSTED) {

View File

@ -66,7 +66,7 @@ describe("/api/global/auth", () => {
it("should return 403 with incorrect credentials", async () => { it("should return 403 with incorrect credentials", async () => {
const tenantId = config.tenantId! const tenantId = config.tenantId!
const email = config.user?.email! const email = config.user?.email!
const password = "incorrect" const password = "incorrect123"
const response = await config.api.auth.login( const response = await config.api.auth.login(
tenantId, tenantId,
@ -83,7 +83,7 @@ describe("/api/global/auth", () => {
it("should return 403 when user doesn't exist", async () => { it("should return 403 when user doesn't exist", async () => {
const tenantId = config.tenantId! const tenantId = config.tenantId!
const email = "invaliduser@example.com" const email = "invaliduser@example.com"
const password = "password" const password = "password123!"
const response = await config.api.auth.login( const response = await config.api.auth.login(
tenantId, tenantId,
@ -203,7 +203,7 @@ describe("/api/global/auth", () => {
) )
delete user.password delete user.password
const newPassword = "newpassword" const newPassword = "newpassword1"
const res = await config.api.auth.updatePassword(code!, newPassword) const res = await config.api.auth.updatePassword(code!, newPassword)
user = (await config.getUser(user.email))! user = (await config.getUser(user.email))!

View File

@ -32,7 +32,7 @@ describe("/api/global/self", () => {
const res = await config.api.self const res = await config.api.self
.updateSelf(user, { .updateSelf(user, {
password: "newPassword", password: "newPassword1",
}) })
.expect(200) .expect(200)

View File

@ -29,7 +29,7 @@ describe("/api/global/tenant", () => {
const tenantInfo: TenantInfo = { const tenantInfo: TenantInfo = {
owner: { owner: {
email: "test@example.com", email: "test@example.com",
password: "PASSWORD", password: "PASSWORD123!",
ssoId: "SSO_ID", ssoId: "SSO_ID",
givenName: "Jane", givenName: "Jane",
familyName: "Doe", familyName: "Doe",

View File

@ -26,6 +26,7 @@ const environment = {
SALT_ROUNDS: process.env.SALT_ROUNDS, SALT_ROUNDS: process.env.SALT_ROUNDS,
REDIS_PASSWORD: process.env.REDIS_PASSWORD, REDIS_PASSWORD: process.env.REDIS_PASSWORD,
COOKIE_DOMAIN: process.env.COOKIE_DOMAIN, COOKIE_DOMAIN: process.env.COOKIE_DOMAIN,
PASSWORD_MIN_LENGTH: process.env.PASSWORD_MIN_LENGTH,
// urls // urls
MINIO_URL: process.env.MINIO_URL, MINIO_URL: process.env.MINIO_URL,
COUCH_DB_URL: process.env.COUCH_DB_URL, COUCH_DB_URL: process.env.COUCH_DB_URL,

View File

@ -44,7 +44,7 @@ class TestConfiguration {
tenantId: string tenantId: string
user?: User user?: User
apiKey?: string apiKey?: string
userPassword = "password" userPassword = "password123!"
constructor(opts: { openServer: boolean } = { openServer: true }) { constructor(opts: { openServer: boolean } = { openServer: true }) {
// default to cloud hosting // default to cloud hosting

View File

@ -48,7 +48,7 @@ export class UserAPI extends TestAPI {
return this.request return this.request
.post(`/api/global/users/invite/accept`) .post(`/api/global/users/invite/accept`)
.send({ .send({
password: "newpassword", password: "newpassword1",
inviteCode: code, inviteCode: code,
firstName: "Ted", firstName: "Ted",
}) })
@ -101,7 +101,7 @@ export class UserAPI extends TestAPI {
if (!request) { if (!request) {
request = { request = {
email: structures.email(), email: structures.email(),
password: generator.string({ length: 8 }), password: generator.string({ length: 12 }),
tenantId: structures.tenant.id(), tenantId: structures.tenant.id(),
} }
} }